General

  • Target

    df9a04f575bb71c96887c8df872d2ad998d374a550df7910ba2768656e0474cd

  • Size

    91KB

  • MD5

    40236df24deb0eea4094872ee7b3084a

  • SHA1

    ad2b4056f858c3cd6c85eb8c18aedcbd0d52463e

  • SHA256

    df9a04f575bb71c96887c8df872d2ad998d374a550df7910ba2768656e0474cd

  • SHA512

    b17f6dc75d26412ea466308279d562a511b293a482c746575bf40a2eab70b29697a5035d9e500428cefa1a1f70cfc69d8c4eec75866b361b7f575671210972a3

  • SSDEEP

    1536:aw7ykwtjyNU5UMTIO1bCFdvT/stkDz23Ymy+WKLm7oa702w/4jdy21Mh7ylLN2UE:awbwt4U5UM11advLstk/oYm3UoaI2ShH

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • df9a04f575bb71c96887c8df872d2ad998d374a550df7910ba2768656e0474cd
    .elf linux x86